Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings
Author: Pil Joong Lee
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23975-8
DOI: 10.1007/b104116
Table of Contents:
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Eliminating Random Permutation Oracles in the Even-Mansour Cipher
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- Stream Ciphers: Dead or Alive?
- On the Generalized Linear Equivalence of Functions Over Finite Fields
- Sieving Using Bucket Sort
- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
- Practical Two-Party Computation Based on the Conditional Gate
- Privacy in Non-private Environments
- Asynchronous Proactive Cryptosystems Without Agreement
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
- Higher Order Universal One-Way Hash Functions
- The MD2 Hash Function Is Not One-Way
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
Includes bibliographical references and index